Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
2ef8f95b62df42c86b0c1cd39f420da7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ef8f95b62df42c86b0c1cd39f420da7_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ef8f95b62df42c86b0c1cd39f420da7_JaffaCakes118.exe
-
Size
203KB
-
MD5
2ef8f95b62df42c86b0c1cd39f420da7
-
SHA1
f2dc2b8f695b6c5a747e7cd13346c7083cdce407
-
SHA256
5847345977681980458661ea492822a9c125b8eb04eb0a76d419c94a3814ac7b
-
SHA512
f41953ad24fe7376aeaba5ecb35670e90da5ac58a6e233aa443f2b953e55aab479ce24bd5e6c32f25ae09bef279747b7dcef62a48ee0734f1a6daf0bdba669b9
-
SSDEEP
6144:1uKpbEMXjkXo21fZ18E2kkTJlvKWinuW1bU3NkfqEg1:1//jk/Z18EcqoQSkfqh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1404 qakjaj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CA4C4FB5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qakjaj.exe" 2ef8f95b62df42c86b0c1cd39f420da7_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: qakjaj.exe File opened (read-only) \??\M: qakjaj.exe File opened (read-only) \??\N: qakjaj.exe File opened (read-only) \??\O: qakjaj.exe File opened (read-only) \??\Q: qakjaj.exe File opened (read-only) \??\T: qakjaj.exe File opened (read-only) \??\A: qakjaj.exe File opened (read-only) \??\J: qakjaj.exe File opened (read-only) \??\Z: qakjaj.exe File opened (read-only) \??\W: qakjaj.exe File opened (read-only) \??\Y: qakjaj.exe File opened (read-only) \??\V: qakjaj.exe File opened (read-only) \??\H: qakjaj.exe File opened (read-only) \??\S: qakjaj.exe File opened (read-only) \??\G: qakjaj.exe File opened (read-only) \??\I: qakjaj.exe File opened (read-only) \??\K: qakjaj.exe File opened (read-only) \??\R: qakjaj.exe File opened (read-only) \??\U: qakjaj.exe File opened (read-only) \??\B: qakjaj.exe File opened (read-only) \??\E: qakjaj.exe File opened (read-only) \??\P: qakjaj.exe File opened (read-only) \??\X: qakjaj.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\DCB95182 = "3930092436" qakjaj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef8f95b62df42c86b0c1cd39f420da7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ef8f95b62df42c86b0c1cd39f420da7_JaffaCakes118.exe"1⤵
- Adds Run key to start application
PID:2492
-
C:\Users\Admin\AppData\Local\Temp\qakjaj.exeC:\Users\Admin\AppData\Local\Temp\qakjaj.exe -svc1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD52ef8f95b62df42c86b0c1cd39f420da7
SHA1f2dc2b8f695b6c5a747e7cd13346c7083cdce407
SHA2565847345977681980458661ea492822a9c125b8eb04eb0a76d419c94a3814ac7b
SHA512f41953ad24fe7376aeaba5ecb35670e90da5ac58a6e233aa443f2b953e55aab479ce24bd5e6c32f25ae09bef279747b7dcef62a48ee0734f1a6daf0bdba669b9